Login / Signup
Weak keys and plaintext recovery for the Dhall-Pal Block Cipher.
Karen Korstanje
Liam Keliher
Published in:
ISCC (2015)
Keyphrases
</>
block cipher
secret key
hash functions
ciphertext
smart card
s box
lightweight
public key
similarity search
encryption scheme
key management
private key
encryption algorithm